Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rehan Akbar is active.

Publication


Featured researches published by Rehan Akbar.


Wireless Communications and Applications (ICWCA 2012), IET International Conference on | 2012

Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat

Sohail Safdar; Mohd Fadzil Hassan; Rehan Akbar; Muhammad Aasim Qureshi

The main objective of the research is to formalize an abstract architecture for the alternative data source that is meant to be used during system availability under intrusion threat. For this purpose, three possible designed semantics have been identify and considered. The security and performance parameters that are required to be exhibited by the alternative data source have been identified. Qualitative analysis is carried out in terms of the identified security and performance parameters, among the considered design semantics to select the potentially secure and suitable design semantic. The selected design semantic becomes the basis of formalizing an abstract architecture for the alternative data source during system availability under intrusion threat scenario. (6 pages)


international conference on future networks | 2018

Graphical authentication based on anti-shoulder surfing mechanism

Goh Wen Bin; Sohail Safdar; Rehan Akbar; Suresh Subramanian

Authentication is one of the most important mechanisms to ensure system accessibility by legitimate users. Various authentication tools exist based on numerous techniques. Distinguishing factors of such authentication tools are the underlying passwords that they imply. These passwords can be textual based, graphical based, hardware based or biometric based. All such password types have their pros and cons. The principle focus of this research is picture-based graphical passwords, since they are easy to remember and can overcome the limitations of using long textual passwords for stronger security. However, mostly the picture-based passwords suffer from shoulder surfing attacks and are therefore vulnerable. If this vulnerability is overcome then such graphical passwords are highly useful because of their strength and ease of use as compared to long textual passwords. The main objective of this research is to propose and develop a picture-based authentication scheme with anti shoulder surfing capability. The proposed authentication scheme consists of both password creation and usage. Both these stages are supported by specialized technical constructs that overcome the anti shoulder surfing attack even if the attacker is standing next to the legitimate user.


international conference on ubiquitous information management and communication | 2017

Mechanism to continue system availability during cyber threat scenario

Sohail Safdar; Mohd Fadzil Hassan; Karim Hajjar; Rehan Akbar; Baraa T. Sharef; Muhammad Aasim Qureshi

It is known that cyber attacks on the application systems causes denial of services to avoid confidentiality and integrity compromise. The system remains inaccessible until it is completely recovered from that threat. This unavailability of the system is very important to handle as it results in huge monetary loss for organizations and their customers suffer with bad quality services. The main research objective is to design a framework for sustaining the systems availability at application level during the period of cyber attack. A designed framework is comprised of two components that propose one of the potential solutions for handling the systems unavailability problem while it is under attack. Ad hoc data migration is the first component that transfers the information to the alternative systems data storage when the attack is detected. Secured authentication is another very important component that compliments the alternatively available system to provide the secured information services to the end user. Secured authentication is designed differently with more strength compared to the conventional textual password authentication scheme so that the malicious users can be restricted from accessing the alternatively available system.


Journal of Software: Evolution and Process | 2017

A meta‐model of software development project states behavioral study of software projects

Rehan Akbar; Mohd Fadzil Hassan; Azrai Abdullah

Software development project during its lifecycle passes through various states. These states describe the condition, status, and behavior of software projects. In the present study, these states are defined based on the various activities performed during project lifecycle like initial environment setup, requirement analysis, coding, testing, problem resolution, and completion. The taxonomy of these states and substates is defined, and a project states meta‐model is designed. The meta‐model is composed of states and substates of the software projects. Detailed case studies of real projects have been conducted to validate the states of the meta‐model. Evidences are collected; and events and observations are recorded about existence of the states, execution flow, duration, and behavior. The evidences, events, and observations are presented in the sequence to translate them into results. Results show that project states exist in all projects such that each software project passes through these states serially and in particular cases, a few states may exist in parallel. Project states show the status and progress of the software projects. It is found that issues in software projects can effectively be resolved by performing micro project management activities of the projects states. Project states meta‐model provides basic structure for deriving new models.


2017 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) | 2017

Review of global software development (GSD) trends in Malaysia and future directions

Asif Riaz Khan; Rehan Akbar; Doris Wong Hooi Ten; Mobashar Rehman; Kiran Adnan

In IT industry, global software development (GSD) is becoming popular since the past few decades. GSD is the process whereby companies are doing development of software at different locations. GSD is adopted by the IT companies to get the advantages of multi-site development, reduce development cost and access large group of skilled labor. Despite the leverage benefits of GSD, several challenges are also associated with it. A number studies have addressed disciplined processes and standards to cope with these challenges. These studies are conducted in different parts of the world but not particularly in Malaysia. The literature on the use of software practices due to GSD in Malaysia is still limited. Therefore, the present study reviews the existing work on GSD and suggests further research in this area in Malaysian context. We present our future research plan for Malaysian software companies that are involved in GSD and project outsourcing. The findings of future researches will help to know the trends of software processes in Malaysia as well as the GSD factors that affect the selection of a process. Moreover, present study also presents a preliminary framework for process selection.


international conference on computer communications | 2015

A short review of Global Software Development (GSD) and latest software development trends

Rehan Akbar; Sohail Safdar

Global Software Development (GSD) has made revolutionary changes in the conventional software development practices. Conventional software market has entered into a new era of smart handheld devices, operating systems like iOS and android, mobile applications, games, and social networking applications. The meanings and building blocks of utility software, operating systems and computers systems have been completely changed. A number of modern and latest tools and technologies are available in the market. Software development has been faster as ever before and market is flooded with uncountable software applications. In such circumstances, traditional approaches of software development are unable to meet the requirements of these latest trends in the IT industry. Consequently, agile methodologies which are designed for conventional software development have rapidly replaced the traditional approaches of software development. The legacy design of agile processes needs to modify to make them suitable for latest trends in software development. This paper discusses these trends in context of GSD and emphasizes on the need of tailoring existing agile processes to face the latest software development trends.


international conference on computer and information sciences | 2014

Software development process tailoring for small and medium sized companies

Rehan Akbar; Sohail Safdar; Mohd Fadzil Hassan; Azrai Abdullah

Software development process tailoring is an emerging practice in todays IT industry. A limited number of research works have been published in this area. The existing process tailoring approaches describe similar set of operations and do not provide proper guidelines on performing process tailoring. These tailoring approaches mainly focus on large companies and tailor only one or two agile methods instead of providing specific guidelines on tailoring agile based methodologies. Unlike large companies, attention has not been given to small and medium sized companies. The present study addresses this limitation, identifies process tailoring operations, key processes of agile based methodologies and uses them for tailoring processes for small and medium sized companies. Qualitative research methods are used to identify and validate tailoring operations and key processes of agile based methodologies. The results show that performing these tailoring operations to tailor key agile based processes is an effective and applicable process tailoring approach for small and medium sized companies. The outcome of the present study would provide basis for formulating process tailoring framework for small and medium sized companies.


open source systems | 2013

Software development project states and project behavior

Rehan Akbar; Sohail Safdar; Muhammad Aasim Qureshi; Mohd Fadzil Hassan; Azrai Abdullah

The behavior of software development projects is a characteristic phenomenon that is difficult to study and analyze. The behavior of a software project is a true indicator of its progress and condition. Unfortunately, very less attention has been given to this important aspect of the software projects and rarely any research study has been presented in this regard. The present study addresses this limitation of existing research work and analyzes the behavior of software development projects based on the project states. Project states and their sub-states for the first time in the present study have been derived from the project lifecycle phases. The behavior of the project states have been analyzed based on the risks faced by the projects and project client factors. A case study of real projects has been conducted to validate the project states and their behavior. The project states reflect the true behavior of the software development projects and determine the status and progress of the project. Initial findings of the study have been presented in this paper which will be followed by publishing more detailed findings on the project states in upcoming paper.


arXiv: Cryptography and Security | 2009

Biologically Inspired Execution Framework for Vulnerable Workflow Systems

Sohail Safdar; Mohd Fadzil Hassan; Muhammad Aasim Qureshi; Rehan Akbar


Journal of Animal and Plant Sciences | 2012

A road map for implementing service oriented agricultural information management system.

Rehan Akbar; Mohd Fadzil Hassan; Azrai Abdullah; M. E. Babar; Sohail Safdar

Collaboration


Dive into the Rehan Akbar's collaboration.

Top Co-Authors

Avatar

Sohail Safdar

Universiti Teknologi Petronas

View shared research outputs
Top Co-Authors

Avatar

Mohd Fadzil Hassan

Universiti Teknologi Petronas

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Azrai Abdullah

Universiti Teknologi Petronas

View shared research outputs
Top Co-Authors

Avatar

Asif Riaz Khan

Universiti Tunku Abdul Rahman

View shared research outputs
Top Co-Authors

Avatar

Mobashar Rehman

Universiti Tunku Abdul Rahman

View shared research outputs
Top Co-Authors

Avatar

Aamir Amin

Universiti Tunku Abdul Rahman

View shared research outputs
Top Co-Authors

Avatar

Baraa T. Sharef

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

D. W. H. Tan

Universiti Tunku Abdul Rahman

View shared research outputs
Top Co-Authors

Avatar

Doris Wong Hooi Ten

Universiti Tunku Abdul Rahman

View shared research outputs
Researchain Logo
Decentralizing Knowledge